Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Protect assets from ransomware, trojans, rootkits and more.
Intelligence and visibility across AWS, O365, DevOps and more.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
2017 has been a busy year for cybersecurity. Between massive data breaches including Verizon, Equifax, Sonic, Uber and the infamous “Paradise Papers”; ransomware variants like Wannacry, NotPetya, Locky, GoldenEye and Jigsaw; and data leaks from major players including the US Air Force’s security clearances, several of the CIA’s confidential documents, and the records of Californian voters, it seems all anyone is talking about is compromised data and security regulations. From healthcare to legal to finance, no industry has come through the year unscathed by cyberattacks and threats.
So, what’s next for cybersecurity? Cybersecurity experts discuss predictions, trends, and what to expect in 2018.
According to Mark Sangster, VP of marketing at eSentire, cybercriminals will likely begin to “move from opportunistic and transactional attacks (for example, generic emails with cryptolocker) to more targeted (industry or firm focused) attacks.” This could lead to cybercriminals:
Director of Threat Intelligence at eSentire, Viktors Engelbrehts, added, “Politically motivated and cyber espionage cyber-attacks against the critical infrastructure industry will continue to increase…There is also the potential for loss of human life as a result of targeted cyber-attacks, especially in the healthcare sector.”
According to Engelbrehts, “Such capabilities can also be used for politically-motivated attacks.”
However, “This assessment may change depending on Law Enforcement (LE) agencies’ abilities to deter cybercrime, prosecute individual criminals, and proactively disrupt malware infrastructure in a coordinated fashion,” he added.
At an individual level, further exposure of personal information coupled with a general lack of user awareness and ongoing data collection initiatives run by private organizations will worsen a user’s overall exposure to attack.
“Such [personal] information will remain highly valuable to cybercriminals and will likely continue to be used to facilitate fraudulent activities on a global scale,” said Engelbrehts.
“IOT will turn to the darkside. We will see many more and expanded attacks coming from IOT devices, both from DDoS attacks and entry points into enterprise networks,” said Joe Rogalski, Director of Solutions Engineering at eSentire.
This will be further demonstrated by an overall false sense of security in the cloud.
“Small and medium enterprises will continue the move to cloud more than ever but will falsely trust that their data is protected by the provider, failing to realize that the end-users and endpoint machines will be targeted to compromise the cloud resources as legitimate users,” he added.
Eldon Sprickerhoff, Chief Security Strategist and Founder at eSentire, also predicted, “The SSO solutions released by major cloud vendors (Amazon, Google, Microsoft) will eviscerate the market for stand-alone solutions.”
Principal Security Strategist at eSentire, Bill Weber, stated, “Business will continue to experience financial losses as they move to adopt cryptocurrency technology without appropriate security controls, creating new markets for trusted providers of crypto-economic business transactions.”
“Successful cryptocurrency attacks will splash headlines—” added Sprickhoff, “—from purely fraudulent ICO's and DoS attacks against crypto-exchanges to accretive vulnerabilities within the codebase itself and focused attacks against software wallets.”
According to Weber, “Government regulatory agencies and business partners will continue moving toward adopting and enforcing financial and criminal liabilities for cybersecurity negligence.”
The fact is, with the influx of data breaches over the past two years, businesses will have to take the necessary steps to meet the increasing number of cybersecurity requirements set forth by regulatory bodies.
Sangster predicts regulators will begin to treat ransomware payments like a breach, requiring declarations and reporting, which will in turn discourage firms from paying. It’s also likely regulators will move to prevent cryptocurrency payments for ransomware.
“In the short-term companies will suffer, but eventually the industry will be better for it,” said Sangster. “Eventually criminals will learn that an industry can’t pay and will move on to the next.”
Furthermore, in 2018, the EU will begin to fine midmarket firms that violate GDPR regulations, “…making a lesson out of them,” added Sangster.
As a result, “the GDPR will spur corporations worldwide to heighten their privacy measures widely, ahead of what extra-legislative bodies may propose,” said Sprickerhoff.
When it comes to the National Institute of Standards and Technology (NIST), Steven Legg, Principle Security Strategist at eSentire, predicts that “there will only continue to be an increased focus on identifying and addressing cybersecurity requirements in a foundational, outcome-focused fashion.”
Currently, much of the proposed NIST CSF draft update focuses on how to customize the framework for maximum benefit while retaining work performed on older versions of the CSF.
“This will influence guidance, requirements, and coaching provided by 3rd party experts as well as regulators looking to provide more specific direction and guidance on meeting provided mandates,” added Legg.
After the cyber-disasters of 2017, it’s more important than ever businesses finalize their cybersecurity plans for 2018. Cybercriminals won’t wait for you to get organized – they’ll attack whether you’re ready or not.
With a general sense of what you might expect, you can devise strategies that will protect you from a number of different cyber-attacks. Don’t know where to start? We can help. With Managed Detection and Response you can rest easy knowing you won’t become just another victim in 2018.
Emily is a content specialist on the Marketing team at eSentire. Drawing on her background in journalism and social media, Emily communicates eSentire's mission with compelling and thought-provoking content.